The ever-escalating arms race between cyber defenders and attackers recently saw a new development with the emergence of SilentButDeadly. This open-source tool introduces a [...]
The persistent threat landscape demands constant vigilance from cybersecurity professionals. A new wave of Formbook malware attacks highlights this critical need, demonstrating sophisticated tactics to [...]
A recent critical vulnerability has surfaced, revealing a concerning attack vector within the Cursor development environment. Threat actors can now leverage rogue Model Context Protocol [...]
Phishing attacks remain a persistent and evolving threat, consistently targeting organizations worldwide. Cybercriminals are relentlessly refining their methods to steal sensitive information, and a recent [...]
Akira Ransomware: A $42 Million Threat Demanding Immediate Attention The digital landscape is under siege, and a prominent threat actor, Akira ransomware, has made its [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Remote Code Execution Vulnerability in Microsoft Graphics Component Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Multiple Vulnerabilities in Zoom Products Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software Affected Zoom Workplace [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Remote Code Execution Vulnerability in Microsoft Edge (Chromium-based) Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 HTTP Open Redirect Vulnerability in CISCO Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: MEDIUM Systems Affected Cisco [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 REST API Command Injection Vulnerability in CISCO Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: MEDIUM Systems Affected [...]
